What, Exactly, Were Russians Trying to Do with Those Facebook Ads?

Total Page:16

File Type:pdf, Size:1020Kb

What, Exactly, Were Russians Trying to Do with Those Facebook Ads? 2/24/2018 What Were Russians Trying to Do With Those Facebook Ads? - The Atlantic What, Exactly, Were Russians Trying to Do With Those Facebook Ads? From what we know now, it was too small to seriously influence the election, but too big to be an afterthought. There are a few possibilities. Adnan Abidi ALEXIS C. MADRIGAL SEP 25, 2017 | TECHNOLOGY Like The Atlantic? Subscribe to The Atlantic Daily, our free weekday email newsletter. Email SIGN UP Many questions remain about the ads purchased by Russian-linked accounts during the 2016 presidential election. Earlier this month, the company announced that Russian-linked accounts had purchased $100,000 worth of advertising. https://www.theatlantic.com/technology/archive/2017/09/the-branching-possibilities-of-the-facebook-russian-ad-buy/541002/ 1/8 2/24/2018 What Were Russians Trying to Do With Those Facebook Ads? - The Atlantic The scale of this advertising buy is mysterious. In an election where billions of dollars were spent, why even bother to spend $100,000? It seems like a drop in the bucket, but also more than nothing. For comparison, in 2015 and 2016, all campaigns directly paid Facebook a collective $11,313,483.59 across all races, according to Federal Election Commission numbers. The Trump campaign paid Facebook $261,685 directly for ads. But those numbers are only lower bounds for the amount of money spent on Facebook because many campaigns pay consultants, who then purchase ads on their behalf. (For example, Cambridge Analytica, which worked with the Cruz and then Trump campaigns, took in $15.4 million during the cycle, including $5 million in one payment from the Trump campaign on September 1.) So, the Russian ad buy is a significant Facebook purchase, but not one that seems scaled to the ambition of interfering with a national U.S. election. That could be because: 1) Not all the ads have been discovered, so the $100,000 is a significant undercount. 2) That was the right number, and the ads worked to aid distribution of disinformation. 3) The ads were part of a message-testing protocol to improve the reach of posts posted natively by other accounts. Think of it as a real- time focus group to test for the most viral content and framing. 4) That $100,000 was a test that didn’t work well, so it didn’t get more resources. 5) That $100,000 was merely a calling card, spent primarily to cause trouble for Facebook and the election system. With the right material, even a little money can go a long way. Let’s walk through these branching possibilities for what this advertising buy could mean. We don’t know much about how Facebook conducted its investigation. We do know that they repeatedly denied there was Russian influence during the election, and then copped to it in early September. https://www.theatlantic.com/technology/archive/2017/09/the-branching-possibilities-of-the-facebook-russian-ad-buy/541002/ 2/8 2/24/2018 What Were Russians Trying to Do With Those Facebook Ads? - The Atlantic A Washington Post article fleshed out a few details, including that President Obama personally spoke with Mark Zuckerberg after the election to get him to take the misinformation campaign seriously. The problem appears to have been that Facebook’s spam- and fraud-tuned machine-learning systems could not see any differences between the “legitimate” speech of Americans discussing the election and the work of Russian operatives. Here’s the description of the process that eventually found the ad purchases: Instead of searching through impossibly large batches of data, Facebook decided to focus on a subset of political ads. Technicians then searched for “indicators” that would link those ads to Russia. To narrow down the search further, Facebook zeroed in on a Russian entity known as the Internet Research Agency, which had been publicly identified as a troll farm. “They worked backward,” a U.S. official said of the process at Facebook. I take this to mean that they identified known Internet Research Agency trolls, looked at the ads they posted, and then looked for similar ads being run, liked, or shared by other accounts. Why this would have taken several months is unclear. Journalist Adrian Chen was able to build out a network of Russian operative–run pages without any of the data that Facebook has. Given that the story he wrote ran in The New York Times Magazine in 2015, you’d think that particular agency would have been the first place Facebook would have looked. That could be one reason a Congressional investigator told the Washington Post that Facebook had only hit “the tip of the iceberg.” https://www.theatlantic.com/technology/archive/2017/09/the-branching-possibilities-of-the-facebook-russian-ad-buy/541002/ 3/8 2/24/2018 What Were Russians Trying to Do With Those Facebook Ads? - The Atlantic But that’s only one possibility. The ads could have done exactly what the Russians intended, even at this limited scale, as part of a broader information campaign. Some context: Facebook ads can do several different things. They can promote a piece of existing content somewhere on the internet. They can be used to try to drive “likes” to a page. They can be used to get people to watch a video. Seeing the ads will be a major part of deciding what the known world of Russian influence was up to. With the right (salacious/truthy/fake) material, even a little money can go a long way. The Daily Beast had a Facebook ad specialist calculate how far $100,000 worth of Facebook spending would go and came up with a range of 23-70 million people, depending on how they were targeted. Vice News talked with the owner of a right-wing Facebook page who uses Facebook ads to juice conservative content. After spending $34,100, the man controlled pages with 1.8 million likes. With that distribution base, he was able to push out content that could, on occasion, do serious numbers. “With a few advertising dollars, one April video ... received more than 27 million views and over 450,000 shares, spreading so pervasively into the conservative media universe that Donald Trump’s official Facebook page shared it two days later,” Vice wrote. So maybe that’s it. The ads were simply a smallish part of growing the distribution network for disinformation and propaganda. Looking back at Adrian Chen’s reporting on the Russian troll farm known most commonly as the Internet Research Agency, there’s a mix of skill and blundering. The Agency was smart enough to set up Chen with a neo-Nazi, surreptitiously photograph it, get stories written about the encounter, and then promote those via social media. But they also struggled to find English speakers who could write with proper grammar. The Agency could orchestrate a very complicated hoax about a chemical plant, but also let a known activist and journalist slip inside the company https://www.theatlantic.com/technology/archive/2017/09/the-branching-possibilities-of-the-facebook-russian-ad-buy/541002/ 4/8 2/24/2018 What Were Russians Trying to Do With Those Facebook Ads? - The Atlantic as new hires. The Agency was playing in international geopolitics, perhaps funded by a billionaire oligarch, but Chen reported the agency’s rumored budget back in 2015 was a mere $400,000 a month, or $4.8 million a year. Perhaps the best mental model is simply a digital-advertising agency. In that case, there are some other intriguing possibilities. Surely the Internet Research Agency would know that buying Facebook ads would look bad for Facebook. Regular digital agencies (and media companies) routinely use Facebook ad buys to test whether stories and their attached “packaging” will fly on the social network. You run a bunch of different variations and find the one that the most people share. If the Internet Research Agency is basically a small digital agency, it would be quite reasonable that there was a small testing budget to see what content the operatives should push. In this case, the buys wouldn’t be about direct distribution of content— they aren’t trying to drive clicks or page likes—but merely to learn about what messages work. And there’s a variation on these two scenarios, too. It could be that only $100,000 got spent simply because the ads were ineffective. Facebook itself has a case study on the reelection bid of Senator Pat Toomey that showed substantial increases in “voter intent” for key demographic groups. But the Toomey campaign spent $2.8 million on digital strategy. That said, there is certainly reasonable doubt that even millions of dollars of Facebook spending could change the outcome of even a state in the U.S. presidential election. And perhaps the digital agency came to the conclusion that its budget was better spent elsewhere. Or maybe one group within the Internet Research Agency began buying ads—we do know the place is obsessed with metrics —to make itself look better to superiors for some period of time. https://www.theatlantic.com/technology/archive/2017/09/the-branching-possibilities-of-the-facebook-russian-ad-buy/541002/ 5/8 2/24/2018 What Were Russians Trying to Do With Those Facebook Ads? - The Atlantic But it seems possible, from Chen’s description, that this was just a small thing for the Agency, which never gained institutional support. And the last possibility is that the Internet Research Agency wanted to make a buy that it knew would get Facebook in trouble with the government once it was revealed.
Recommended publications
  • Disinformation, and Influence Campaigns on Twitter 'Fake News'
    Disinformation, ‘Fake News’ and Influence Campaigns on Twitter OCTOBER 2018 Matthew Hindman Vlad Barash George Washington University Graphika Contents Executive Summary . 3 Introduction . 7 A Problem Both Old and New . 9 Defining Fake News Outlets . 13 Bots, Trolls and ‘Cyborgs’ on Twitter . 16 Map Methodology . 19 Election Data and Maps . 22 Election Core Map Election Periphery Map Postelection Map Fake Accounts From Russia’s Most Prominent Troll Farm . 33 Disinformation Campaigns on Twitter: Chronotopes . 34 #NoDAPL #WikiLeaks #SpiritCooking #SyriaHoax #SethRich Conclusion . 43 Bibliography . 45 Notes . 55 2 EXECUTIVE SUMMARY This study is one of the largest analyses to date on how fake news spread on Twitter both during and after the 2016 election campaign. Using tools and mapping methods from Graphika, a social media intelligence firm, we study more than 10 million tweets from 700,000 Twitter accounts that linked to more than 600 fake and conspiracy news outlets. Crucially, we study fake and con- spiracy news both before and after the election, allowing us to measure how the fake news ecosystem has evolved since November 2016. Much fake news and disinformation is still being spread on Twitter. Consistent with other research, we find more than 6.6 million tweets linking to fake and conspiracy news publishers in the month before the 2016 election. Yet disinformation continues to be a substantial problem postelection, with 4.0 million tweets linking to fake and conspiracy news publishers found in a 30-day period from mid-March to mid-April 2017. Contrary to claims that fake news is a game of “whack-a-mole,” more than 80 percent of the disinformation accounts in our election maps are still active as this report goes to press.
    [Show full text]
  • S:\FULLCO~1\HEARIN~1\Committee Print 2018\Henry\Jan. 9 Report
    Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. 1 115TH CONGRESS " ! S. PRT. 2d Session COMMITTEE PRINT 115–21 PUTIN’S ASYMMETRIC ASSAULT ON DEMOCRACY IN RUSSIA AND EUROPE: IMPLICATIONS FOR U.S. NATIONAL SECURITY A MINORITY STAFF REPORT PREPARED FOR THE USE OF THE COMMITTEE ON FOREIGN RELATIONS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION JANUARY 10, 2018 Printed for the use of the Committee on Foreign Relations Available via World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PUBLISHING OFFICE 28–110 PDF WASHINGTON : 2018 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5012 Sfmt 5012 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN. 9 REPORT FOREI-42327 with DISTILLER seneagle Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. COMMITTEE ON FOREIGN RELATIONS BOB CORKER, Tennessee, Chairman JAMES E. RISCH, Idaho BENJAMIN L. CARDIN, Maryland MARCO RUBIO, Florida ROBERT MENENDEZ, New Jersey RON JOHNSON, Wisconsin JEANNE SHAHEEN, New Hampshire JEFF FLAKE, Arizona CHRISTOPHER A. COONS, Delaware CORY GARDNER, Colorado TOM UDALL, New Mexico TODD YOUNG, Indiana CHRISTOPHER MURPHY, Connecticut JOHN BARRASSO, Wyoming TIM KAINE, Virginia JOHNNY ISAKSON, Georgia EDWARD J. MARKEY, Massachusetts ROB PORTMAN, Ohio JEFF MERKLEY, Oregon RAND PAUL, Kentucky CORY A. BOOKER, New Jersey TODD WOMACK, Staff Director JESSICA LEWIS, Democratic Staff Director JOHN DUTTON, Chief Clerk (II) VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN.
    [Show full text]
  • Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (Information
    The Information Society Series Laura DeNardis and Michael Zimmer, Series Editors Interfaces on Trial 2.0, Jonathan Band and Masanobu Katoh Opening Standards: The Global Politics of Interoperability, Laura DeNardis, editor The Reputation Society: How Online Opinions Are Reshaping the Offline World, Hassan Masum and Mark Tovey, editors The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright, Hector Postigo Technologies of Choice? ICTs, Development, and the Capabilities Approach, Dorothea Kleine Pirate Politics: The New Information Policy Contests, Patrick Burkart After Access: The Mobile Internet and Inclusion in the Developing World, Jonathan Donner The World Made Meme: Public Conversations and Participatory Media, Ryan Milner The End of Ownership: Personal Property in the Digital Economy, Aaron Perzanowski and Jason Schultz Digital Countercultures and the Struggle for Community, Jessica Lingel Protecting Children Online? Cyberbullying Policies of Social Media Companies, Tijana Milosevic Authors, Users, and Pirates: Copyright Law and Subjectivity, James Meese Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P, Robert W. Gehl Weaving the Dark Web Legitimacy on Freenet, Tor, and I2P Robert W. Gehl The MIT Press Cambridge, Massachusetts London, England © 2018 Robert W. Gehl All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. This book was set in ITC Stone Serif Std by Toppan Best-set Premedia Limited. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data is available. ISBN: 978-0-262-03826-3 eISBN 9780262347570 ePub Version 1.0 I wrote parts of this while looking around for my father, who died while I wrote this book.
    [Show full text]
  • What's a Patent Owner To
    Winter 2018 Vol. 16, Issue 1 A review of developments in Intellectual Property Law Motions to Amend at the PTAB after Aqua Products, Inc. v. Matal – What’s a Patent Owner to Do? By Andrew W. Williams, Ph.D. conducted by the Patent Trial and Appeal Board shifting to the patent owner, however, was In 2011, Congress enacted (“PTAB” or “Board”) that analyzed statistics in not found in either the statute or the rules the America Invents Act and all IPRs, CBMs, and PGRs. The third and most promulgated by the Patent Office. Instead, the created new mechanisms recent iteration included data through the Fiscal PTAB interpreted its regulations in an early to challenge issued claims Year 2017 (which ended on September 30, decision, Idle Free Sys., Inc. v. Bergstrom, Inc.1 at the Patent Office. The 2017). The first thing this study revealed is that In Idle Free, the PTAB indicated that the burden goal was to expeditiously motions to amend were filed in only 275 out is on the patent owner to show “a patentable resolve issues of patent of 2,766 completed trials, or 10%. The Board distinction over the prior art of record and also validity in response to the counted a trial as “completed” when it was prior art known to the patent owner.”2 The public outcry that validity terminated due to settlement, when there was Board subsequently relaxed the patent owner’s challenges in the federal courts were too a request for adverse judgement, when it was burden in MasterImage 3D, Inc. v.
    [Show full text]
  • FCJ-156 Hacking the Social: Internet Memes, Identity Antagonism, and the Logic of Lulz
    The Fibreculture Journal issn: 1449-1443 DIGITAL MEDIA + NETWORKS + TRANSDISCIPLINARY CRITIQUE issue 22 2013: Trolls and the Negative Space of the Internet FCJ-156 Hacking the Social: Internet Memes, Identity Antagonism, and the Logic of Lulz Ryan M. Milner College of Charleston Abstract: 4chan and reddit are participatory media collectives undergirded by a “logic of lulz” that favours distanced irony and critique. It often works at the expense of core identity categories like race and gender. However, the logic need not be entirely counterproductive to public discourse. Provided that diverse identities find voice instead of exclusion, these sites may facilitate vibrant, agonistic discussion instead of disenfranchising antagonism. In order to assess this potential for productive agonism, I undertook a critical discourse analysis of these collectives. Emphasising the image memes they produce, I evaluated discourses on race and gender. Both race and gender representations were dominated by familiar stereotypes and partial representations. However, while dissenting perspectives on race were repressed or excluded, dissenting perspectives on gender were vocalised and contested. The ‘logic of lulz’ facilitated both dominance and counter, each articulated with heavy reliance on irony and critique. This logic ambiguously balanced agonism and antagonism, but contestation provided sharper engagement than repression. 62 FCJ-156 fibreculturejournal.org Ryan M. Milner ‘A troll exploits social dynamics like computer hackers exploit security loop- holes…’ (Adrian Chen, 2012 October 12) In October 2012, reddit – a popular link aggregation service and public discussion forum – was embroiled in a prominent controversy. Adrian Chen, a journalist for the news site Gawker, had just revealed the ‘offline’ identity of Violentacrez, one of reddit’s ‘most reviled characters but also one if its most beloved users’ (Chen, 2012 October 12).
    [Show full text]
  • Silk Road: After Being Closed Twice, Can the Brand Ever 'Rise Again?'
    GDPO Situation Analysis January 2015 Silk Road: After being closed twice, can the brand ever ‘rise again?’ Alois Afilipoaie and Patrick Shortis Since 2011 the Silk Road marketplace has been known as the flagship brand of Dark Net markets. For a long time it was the cornerstone of illicit trade over the Dark Net, despite being shut down by the FBI in October 2013 its successor Silk Road 2.0 was created in a month and quickly outgrew its predecessor. On November 6th 2014, the Silk Road 2.0 was closed in an international law enforcement operation dubbed ‘Operation Onymous’1. Despite being taken down twice by law enforcement, the Silk Road was both a pathfinder and a trend-setter in the world of Dark Net markets. As a brand it will never be forgotten and may possibly continue to rise repeatedly as a hidden service on the Tor network, however as a marketplace the damage done by two busts may have finally put an end to its viability as a popular destination for those looking to engage in illicit trade. The Silk Road marketplace (February 2011–October 2013) Founded in February 2011, The Silk Road marketplace2 created the most popular brand of any Dark Net market. Media attention in a 2011 article by Gawker writer Adrian Chen shot it to internet fame. Initially it sold a plethora of illicit items including drugs and weapons. Eventually it refined its identity as a market with libertarian philosophies and an ethical approach to its wares, it removed weapons from its listings as well as ‘anything whose purpose is to harm or defraud’, giving it an ethical edge over its competitors that many users enjoyed.
    [Show full text]
  • Yale Information Society Project
    Yale Information Society Project House of Representatives Committee on Energy and Commerce Subcommittee on Communications and Technology “Algorithms: How Companies’ Decisions About Data and Content Impact Consumers” November 29, 2017 Written Remarks of Kate Klonick Yale Law School Information Society Project* Chairman Blackburn, Ranking Member Doyle, and Members of the Subcommittee: Every day millions of people around the world post pictures, videos, and text to online speech platforms, but not everything that is posted remains there. Sites like Facebook, Twitter, and YouTube actively curate the content that is posted by their users through a mix of algorithmic and human processes, broadly termed content moderation. Until recently, how and why these platforms made these decisions on user speech was largely opaque. For two years I have interviewed over three-dozen former and current executives and content moderation workers at these companies in an effort to better understand how and why these platforms regulate content. This written testimony borrows heavily from my Article summarizing those findings1 and attempts to clarify a few major points about content moderation, including: • The vast majority of content moderation of user content (roughly estimated at over 90%) is done by trained human content moderators who review content only after it has been flagged by platform users and not by algorithms, contrary to this hearing’s title. • While users at sites like Facebook are given a public set of “Community Standards” guiding what kind of content is posted on the site, a separate much more detailed, and much more regularly updated set of internal rules is used by human moderators in making their decisions.
    [Show full text]
  • A Conversation with Andrew Culp
    Andrew Culp (with Anirban Baishya) Data, Media, Ethics: A Conversation with Andrew Culp “Networks are not just for the counter-culture anymore, they are how the military plans war, companies do business, and governments cast their influence.” Andrew Culp teaches Media History and Theory in the MA Program in Aesthetics and Politics and the School of Critical Studies at CalArts. He is the author of Dark Deleuze (University of Minnesota Press, 2016) which has been translated into Spanish, Japanese and German. His research theorizes the ambivalent effects of network culture from the anti-globalization movements to the monetization of social relations of the Web 2.0 sharing economy. In this piece, Culp shares his thoughts on datafication, tech culture, and the emerging horizons of technocratic governmentality. Anirban Baishya (AB): The term “big-data” gets a moral philosophy to a science of government as thrown around almost as if it were a magical thing. the Physiocrats argue for the connection between But, as Craig Dalton and Jim Thatcher put it: “‘Big value and price. The consequence is more than a data’ has big precursors, earlier knowledges that set data-driven approach to commerce, it constitutes the stage and helped define the nature and needs a science in which the market speaks a truth that that present-day ‘big data’ realizes.” So, what exactly verifies governmental practice. Perhaps even more is different about big data (or what’s the BIG in big importantly, this is also the time of Adolphe data)? Quetelet, father of “social physics” and the birth of l’homme moyen (“the average man”).
    [Show full text]
  • A RHETORICAL ANALYSIS of GREENTEXT STORIES Agustin
    ABSTRACT FROM READERLY TO WRITERLY (AND BACK AGAIN): A RHETORICAL ANALYSIS OF GREENTEXT STORIES Agustin Morado IV, M.A. Department of English Northern Illinois University, 2016 Philip Eubanks, Director Greentext stories, a relatively new genre of short fiction, emerged from the image board site 4chan in early 2010. Although 4chan is known for its off-color, offensive humor, the popularity of greentext stories on the imageboard as well as on other websites warrants a serious rhetorical analysis. Drawing primarily on ideas from Collin Gifford Brooke, Roland Barthes, Kenneth Burke, and Carolyn Miller, greentext stories are first posted to 4chan as part of a performative dialogue, creating threads which are large writerly texts made of smaller readerly ones; this offers anonymous 4chan users, who tend to be outsiders from mainstream society, a way to identify with each other through shared stories. As users share notable stories on more mainstream sites, Ridolfo and DeVoss’s idea of rhetorical velocity takes over, allowing one’s text to be reappropriated and even recomposed by another. This process allows the genre to creatively rewrite popular stories based on established archetypes. The way in which greentext stories spread and are rewritten raises key questions of authorship and copyright and how far one can go in appropriating and rewriting the work of others, including for profit, as is seen with recently published collections of greentext stories. As the genre continues to spread, it is certainly possible that claims in authorship will
    [Show full text]
  • Virtue Ethics Nikki Coffey Tousley University of Dayton
    University of Dayton eCommons Religious Studies Faculty Publications Department of Religious Studies 2011 Virtue Ethics Nikki Coffey Tousley University of Dayton Brad Kallenberg University of Dayton, [email protected] Follow this and additional works at: http://ecommons.udayton.edu/rel_fac_pub Part of the Ethics and Political Philosophy Commons, Ethics in Religion Commons, Practical Theology Commons, and the Religious Thought, Theology and Philosophy of Religion Commons eCommons Citation Tousley, Nikki Coffey nda Kallenberg, Brad, "Virtue Ethics" (2011). Religious Studies Faculty Publications. Paper 59. http://ecommons.udayton.edu/rel_fac_pub/59 This Encyclopedia Entry is brought to you for free and open access by the Department of Religious Studies at eCommons. It has been accepted for inclusion in Religious Studies Faculty Publications by an authorized administrator of eCommons. For more information, please contact [email protected], [email protected]. The document here is the authors’ accepted manuscript for the following publication: Tousley, Nikki Coffey and Kallenberg, Brad J. “Virtue Ethics.” In Dictionary of Scripture and Ethics, edited by Joel Green, Jacqueline Lapsley, Rebekah Miles and Allen Verhey. Grand Rapids, MI: Baker Academic, 2011. Virtue Ethics Brad J. Kallenberg If a burglar is breaking into the house, it is too late to begin lifting weights. Underneath the humor, there is a truism: You are always becoming the person you are. This truism is the basis for a model of ethics.1 1. What is Virtue Ethics? It is sometimes helpful to think about moral situations as having three logical moments: Agent(s) perform Action(s) that result in Outcome(s). One brand of ethics treats outcomes as the most important consideration in determining right and wrong (e.g., utilitarianism).
    [Show full text]
  • Fake News: the Commoditization of Internet Speech
    Vojak: Fake News: The Commoditization of Internet Speech Vojak.FakeNews.camera ready (Do Not Delete) 5/16/2018 11:11 AM NOTE FAKE NEWS: THE COMMODITIZATION OF INTERNET SPEECH TABLE OF CONTENTS INTRODUCTION ........................................................................... 124 I. WHAT IS FAKE NEWS? ............................................................ 128 A. Accidental – Viral Fake News .................................... 130 B. Accidental – Irresponsible Media .............................. 134 C. Intentional – Fake News as an Agent of Chaos or Influence .................................................................... 136 D. Intentional – Fake News for Profit ............................ 140 II. IMPEDIMENTS TO FAKE NEWS REGULATION ......................... 143 A. United States Supreme Court ...................................... 144 B. United States’ State Courts ......................................... 146 C. Communications Decency Act, Section 230............... 149 III. “COMMODITIZED SPEECH” SOLUTION IN THREE PARTS ....... 151 A. Defining “Commoditized Speech” .............................. 153 B. European Judicial Review Paradigm ......................... 153 C. Internet Service Provider Liability ............................ 155 CONCLUSION .............................................................................. 157 INTRODUCTION What do a recent college graduate living in North Carolina,1 a 2 computer science student in Tbilisi, Georgia, and a teenager in the 1. Scott Shane, From Headline to Photograph
    [Show full text]
  • Silk Road – Anonymous Deep Web Marketplace
    SILK ROAD – ANONYMOUS DEEP WEB MARKETPLACE April 2013 Cara Bloom NOTE Since this paper has been written Silk Road founder and admin Dread Pirate Roberts has been revealed to be San Franciscan Ross Ulbricht, the site has been shut down twice and the current iteration Silk Road 3.0 is running similarly to the version discussed in this paper, the original Silk Road 1.0. Millions in Bitcoins have been confiscated by the FBI and dozens of admins and sellers have been arrested. All of these recent events will have caused changes to the site’s infrastructure and user culture that are not discussed in the following paper. ABSTRACT The Silk Road is an anonymous marketplace for contraband that can only be accessed through the Deep Web and functions through implementation careful security measures including the use of Bitcoins as its only currency. Buyers and sellers create trust the site by rating one another and the site supports a trusting environment with an escrow system to hedge transactions. Users can also interact in a separate forum where Silk Road culture can be seen. Though the site has received mixed reactions from the media these articles have caused the site to grow. Many governments have targeted the Silk Road and attacks have been made against it. Throughout, the marketplace has continued to expand and increase its security measures, making it the most popular online market for drugs. THE DEEP WEB Commercial anonymity has been revolutionized by the web. In years past to make a transaction there had to be face-to-face contact between the customer and the seller, while modern consumers can purchase almost anything online without any human interaction.
    [Show full text]